Abstract
Since organizations have recognized needs for industrial technique leakage prevention, they tend to construct information security system causing huge consumption of budget, yet many of them are not affordable to organize information security team to operate integrated information security management system with consistent investment and maintenance. It is fact that there only occur instant introductions of certain system. In this study, we designed information security management system for organizations’ industrial technology leakage prevention which is differentiated from those of large enterprises based on current status of small and medium-sized organizations’ industrial technology leakage. Specifically we analyzed current status and vulnerability of organizations’ industrial technique leakage and we designed industrial technique leakage prevention management system for organizations. Then we applied Delphi method to validate appropriateness of study result. We strongly believe that organizations may estimate an appropriate level of investment on information security and develop countermeasures for control by utilizing this study result.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Weill P, Vitale M (2002) What IT infrastructure capabilities are needed to implement e-business models? MIS Q Executive 1(1):17–34
BSI (1999) BS 7799 Part1: information security management—code of practice for information security management
Doukidis GI, Lybereas P, Galliers RD (1996) Information systems planning in small business: a stages of growth analysis. J Syst Softw Arch 33
Eloff MM, von Solms SH (2000) Information security management: an approach to combine process certification and product evaluation. Comput Secur 19
NIST Technology Administration (1998) An introduction to computer security: the NIST handbook. NIST, USA
ISACA (2001) Information security governance, guidance for boards of directors and executive management. IT Governance Institute
Levy M, Powell P (1998) SME flexibility and the role of information systems. Small Bus Econ 2
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media B.V.
About this paper
Cite this paper
Chang, H., Kang, J., Na, Y. (2011). The Security Management Model for Small Organization in Intelligence All-Things Environment. In: Park, J., Arabnia, H., Chang, HB., Shon, T. (eds) IT Convergence and Services. Lecture Notes in Electrical Engineering, vol 107. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2598-0_7
Download citation
DOI: https://doi.org/10.1007/978-94-007-2598-0_7
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2597-3
Online ISBN: 978-94-007-2598-0
eBook Packages: EngineeringEngineering (R0)